Enterprises today face the risk of attacks to their data from the outside and the inside. Employees or employee identities are typical attack vectors for a low-and-slow data exfiltration attack. In this session, CA Technologies CIO, Mahendra Durai, will explore the strategies and approaches an enterprise can adopt to create and implement a comprehensive insider-threat protection plan with user behavior analytics, "indicators of compromise" hunting strategies and red-team exercises designed to identify, detect, protect and respond to threat and risk scenarios.